Vulnerability Details : CVE-2014-0510
Heap-based buffer overflow in Adobe Flash Player 12.0.0.77 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by Zeguang Zhao and Liang Chen during a Pwn2Own competition at CanSecWest 2014.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2014-0510
Probability of exploitation activity in the next 30 days: 52.00%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0510
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2014-0510
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0510
-
http://helpx.adobe.com/security/products/flash-player/apsb14-14.html
Adobe Security Bulletin
-
http://twitter.com/thezdi/statuses/444262022444621824
Zero Day Initiative on Twitter: "Success for members of Keen Team and team509 as Flash falls. Adobe, please prepare for validation and responsible disclosure. #pwn2own"
-
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00008.html
[security-announce] SUSE-SU-2014:0671-1: important: Security update for
- http://www.pwn2own.com/2014/03/pwn2own-results-thursday-day-two/
-
http://www.securityfocus.com/bid/66241
Adobe Flash Player and Adobe AIR CVE-2014-0510 Heap Based Buffer Overflow Vulnerability
-
http://security.gentoo.org/glsa/glsa-201406-08.xml
Adobe Flash Player: Multiple vulnerabilities (GLSA 201406-08) — Gentoo security
-
http://rhn.redhat.com/errata/RHSA-2014-0496.html
RHSA-2014:0496 - Security Advisory - Red Hat Customer Portal
Products affected by CVE-2014-0510
- cpe:2.3:a:adobe:flash_player:12.0.0.77:*:*:*:*:*:*:*